Beyond the Build: Dynamic Remediation for Malicious Package Versions
.png)
In the fast-moving world of software supply chains, the discovery of a malicious version of a popular library often triggers a state of emergency. Traditional security tools take a reactive approach: they scan, they find a match, and they fail the build.
But what happens if the malicious version was merged before it was flagged? What if it’s already running in your production containers? Or what if it’s being pulled dynamically across hundreds of different pipelines?
Today, we are moving beyond simple "blocking" to provide true Dynamic Remediation for malicious versions. Our platform doesn't just identify the threat; it provides the infrastructure to neutralize it everywhere - from the artifact server to the live production container.
The Problem: The Remediation Lag
When a trusted package is compromised and a malicious version is released, security teams face two massive hurdles:
- The "Live" Threat: By the time a version is flagged as malicious, it may already be deployed. Traditional tools can tell you that a container is at risk, but fixing it usually requires a full development cycle: code changes, PR approvals, and a fresh CI/CD run.
- The "Whack-a-Mole" Pipeline: In large organizations, a single malicious version might be resolved across hundreds of disparate pipelines. Manually updating every
package-lock.jsonor pinning versions across every project is a logistical nightmare that leaves windows of vulnerability open for days.
The Solution: Global Neutralization and Live Fixing
We have built a two-pronged approach to ensure that once a malicious version is identified, it is effectively erased from your environment - without breaking your delivery velocity.
1. Remediation at Scale: Artifact Server Caching
The most effective way to protect an organization is at the source. Our platform integrates with your private artifact servers (Artifactory, Nexus, etc.) to implement Safe-State Caching.
When our system identifies a malicious version, we ensure your CI gets the prior legitimate version as the resolution target.
- Universal Protection: Every pipeline in your organization - regardless of whether it's pinned, unpinned, or managed by a legacy script - will automatically receive the legitimate version.
- Transparent Swapping: The CI build proceeds without interruption. We swap the malicious code for the legitimate version at the network layer, ensuring that even "stupid" or malicious AI/human commits cannot introduce the threat into your builds.
2. The "Seal Fix": Instant Production Remediation
For containers that have already reached production, we’ve introduced the seal fix command.
Security shouldn't have to wait for a developer to wake up and submit a PR. The seal fix command allows platform teams to:
- Inject Fixes Directly: Replace the malicious version with the prior legitimate version inside a running container image.
- Avoid Re-builds: Neutralize the threat in minutes rather than hours by bypassing the standard CI bottleneck.
- Maintain Uptime: Because we revert to the most recent legitimate version, compatibility is maintained, ensuring your services stay up while the threat is removed.
Why This is a Game Changer
- Neutralizing the Malicious Insider: Even if a malicious insider pushes a version bump to a tainted release, the artifact-level cache ensures that the actual code reaching the build machine is legitimate.
- AI and Human Error Resilience: Whether an AI agent "hallucinates" a version bump or a human is duped into an update, our transparent swapping ensures the production environment is never compromised.
- No More "Immediate Fires": By swapping instead of failing, we remove the "kill switch" mentality. You get the security of a fix with the stability of a successful build.
Multi-Ecosystem Support
This dynamic remediation is live across all major ecosystems: npm, Maven, Python, and Go.
Moving Toward Zero-Friction Security
The goal of modern security is resilience and speed, not just resistance. By providing tools that can remediate live environments and synchronize fixes across the entire organization’s infrastructure, with minimal developer involvement, we ensure that malicious versions are a footnote, not a catastrophe.
Secure your artifacts. Fix your containers. Keep your velocity.


.png)
.png)
.png)
